Read the latest in-depth security threat research reports, get insights from McAfee security experts, and learn how to protect your enterprise from malware, cybercrime, and other cybersecurity threats.Visit Security Awareness
What is Threat Center?
Threat Center is McAfee’s cyberthreat information hub. From here, you can learn about top cybersecurity threats in our continuously curated Threat Landscape Dashboard, search our McAfee GTI database of known security threats, read in-depth threat research reports that detail significant attacks and how to protect against them, access a variety of free security tools, and provide threat feedback.
Top cybersecurity threats
Learn about today’s top cybersecurity threats. These security threats have been identified and analyzed by our threat research team as the most impactful threats today. These include threats to network security, information security, and more. Click on a specific threat to learn about how to best protect your business.
This campaign uses a malicious Word document that leverages the Microsoft Office Dynamic Data Exchange (DDE) technique to bypass network defenses. Regardless of whether macros are enabled, the use of DDE with PowerShell allows an attacker to execute arbitrary code on a victim’s system.Learn More >
This campaign targets a wide range of sectors across the globe to steal sensitive information. The operation uses trojanized Android apps as the primary attack vector.Learn More >
Microsoft Office 2007 Service Pack 3, Microsoft Office 2010 Service Pack 2, Microsoft Office 2013 Service Pack 1, and Microsoft Office 2016 allow an attacker to run arbitrary code in the context of the current user by failing to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability.”Learn More >
This ever-evolving ransomware targets Windows users and does not infect computers using the Russian language. The malware encrypts files located in multiple locations including local and remote drives, removable drives, mapped drives, and unmapped network shares.Learn More >
RIG is spread via suspicious advertisements that have been inserted into legitimate websites. The VIP version of the exploit kit, RIG-v, appeared in 2016 and uses new URL patterns.Learn More >
Search the Threat Library
McAfee threat research teams
Over 250 researchers around the world analyze suspicious objects and behaviors for malicious threats. Their research is central to McAfee’s ability to deliver real-time threat intelligence, critical analysis, and expert thinking that protects our customers’ systems and networks.McAfee Labs Advanced Threat Research Team